Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks

Lei Hou,Haixin Duan,Jianping Wu
DOI: https://doi.org/10.1109/CIT.2010.184
2010-01-01
Abstract:In Peer-to-Peer (P2P) networks a malicious peer can control the direction of the traffic after it controls lots of bots. This paper focus on defending Distributed Denial of Service (DDoS) attack in P2P networks by selecting the most active peer with its credit values which is recorded in a period of Credit Construction time. The Credit values can be updated in the lest period. We propose Scheduler to compute local credit values and maintain the global trust relationships. In order to assess the effectiveness of the above techniques, we extend Sybil attack and DDoS attack in simulator tool named p2psim-0.3 and implement distinguishing master and updating credit algorithms. Although we adopt tapestry protocol and Euclidean topology to implement the algorithms, the same methodology can be applied to other DHT (Distributed Hash Table)_based lookup protocols in P2P networks and topologies as well.
What problem does this paper attempt to address?